Title 6Domestic SecurityRelease 119-73not60

§650 Definitions

Title 6 › Chapter 1— HOMELAND SECURITY ORGANIZATION › Subchapter XVIII— CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY › § 650

Last updated Apr 3, 2026|Official source

Summary

Defines key words used in this part of the law so people know what the words mean. Agency is the Cybersecurity and Infrastructure Security Agency. Appropriate congressional committees are the Senate Committee on Homeland Security and Governmental Affairs and the House Committee on Homeland Security. Cloud service provider means a company that offers cloud computing services as defined by NIST Special Publication 800‑145. Critical infrastructure information covers three kinds of nonpublic details about infrastructure security: attacks or threats, how able a system is to resist those threats (including tests and risk plans), and past or planned operational problems or fixes related to those threats. Cyber threat indicator is information needed to describe or identify things like malicious scanning, ways to defeat defenses, vulnerabilities, tricks that make users enable attacks, command‑and‑control for attacks, harm or stolen data, or other threat attributes not barred by law. Cybersecurity purpose means protecting systems or the information they hold, process, or send from cyber threats or vulnerabilities. Cybersecurity risk means threats, weaknesses, and the harms that come from unauthorized access, use, disclosure, disruption, or destruction, but it does not include only breaking a consumer term of service or license. Cybersecurity threat means an action on or through an information system that can cause unauthorized harm to its security, availability, confidentiality, or integrity, excluding actions that only break a consumer term of service or license and excluding First Amendment protected activity. Defensive measure means a tool or action used on systems or data to detect, stop, or reduce a known or suspected cyber threat, but not actions that destroy, make unusable, give unauthorized access to, or seriously harm systems or data that the private operator does not own unless proper consent is given. Director means the Director of CISA. Homeland Security Enterprise means the mix of government and non‑government groups involved in homeland security, like federal, state, local, and Tribal officials, private companies, academics, and experts. Incident means an event that actually or almost immediately threatens without legal authority the integrity, confidentiality, or availability of information or an information system. Information Sharing and Analysis Organization is any group set up by public or private entities to collect, study, share, and spread critical infrastructure information and cybersecurity risk or incident information to help prevent, detect, respond to, or recover from problems. Information system has the meaning in 44 U.S.C. 3502 and includes industrial control systems like SCADA, distributed control systems, and programmable logic controllers. Intelligence community has the meaning in 50 U.S.C. 3003(4). Malicious cyber command and control means a way to remotely identify, access, or use a system or its data without authorization. Malicious reconnaissance means actively probing or passively watching a system to find security weaknesses when tied to a known or suspected cyber threat. Managed service provider is a company that delivers ongoing support or runs network, application, infrastructure, or security services at a customer site, the provider’s data center, or a third‑party data center. Monitor means to acquire, find, scan, or hold information that is stored on, processed by, or passing through an information system. National cybersecurity asset response activities include giving technical help to affected entities, finding other at‑risk parties, assessing sector or regional risks and cascading effects, coordinating information and response, and advising how to use federal resources to recover quickly. National security system has the meaning in 40 U.S.C. 11103. Ransomware attack means an incident using or threatening malicious code or other digital methods (like denial of service) to disrupt systems or compromise data to force a ransom payment, but not events where the demand is not genuine or is a good‑faith request by an entity at the owner’s request. Sector Risk Management Agency means a federal department or agency designated by law or the President to provide sector expertise and lead or support programs with the Department. Security control means the management, operational, and technical protections used to defend a system or its information. Security vulnerability means any hardware, software, process, or procedure flaw that could help defeat a security control. Sharing means providing, receiving, or disseminating information. SLTT entity means a State, local, Tribal, or territorial government or any subdivision of them. Supply chain compromise means an incident in a system’s supply chain that an adversary can use, or does use, to harm the system’s confidentiality, integrity, or availability at any point in its life cycle.

Full Legal Text

Title 6, §650

Domestic Security — Source: USLM XML via OLRC

Except as otherwise specifically provided, in this subchapter:
(1)The term “Agency” means the Cybersecurity and Infrastructure Security Agency.
(2)The term “appropriate congressional committees” means—
(A)the Committee on Homeland Security and Governmental Affairs of the Senate; and
(B)the Committee on Homeland Security of the House of Representatives.
(3)The term “cloud service provider” means an entity offering products or services related to cloud computing, as defined by the National Institute of Standards and Technology in NIST Special Publication 800–145 and any amendatory or superseding document relating thereto.
(4)The term “critical infrastructure information” means information not customarily in the public domain and related to the security of critical infrastructure or protected systems—
(A)actual, potential, or threatened interference with, attack on, compromise of, or incapacitation of critical infrastructure or protected systems by either physical or computer-based attack or other similar conduct (including the misuse of or unauthorized access to all types of communications and data transmission systems) that violates Federal, State, or local law, harms interstate commerce of the United States, or threatens public health or safety;
(B)the ability of any critical infrastructure or protected system to resist such interference, compromise, or incapacitation, including any planned or past assessment, projection, or estimate of the vulnerability of critical infrastructure or a protected system, including security testing, risk evaluation thereto, risk management planning, or risk audit; or
(C)any planned or past operational problem or solution regarding critical infrastructure or protected systems, including repair, recovery, reconstruction, insurance, or continuity, to the extent it is related to such interference, compromise, or incapacitation.
(5)The term “cyber threat indicator” means information that is necessary to describe or identify—
(A)malicious reconnaissance, including anomalous patterns of communications that appear to be transmitted for the purpose of gathering technical information related to a cybersecurity threat or security vulnerability;
(B)a method of defeating a security control or exploitation of a security vulnerability;
(C)a security vulnerability, including anomalous activity that appears to indicate the existence of a security vulnerability;
(D)a method of causing a user with legitimate access to an information system or information that is stored on, processed by, or transiting an information system to unwittingly enable the defeat of a security control or exploitation of a security vulnerability;
(E)malicious cyber command and control;
(F)the actual or potential harm caused by an incident, including a description of the information exfiltrated as a result of a particular cybersecurity threat;
(G)any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law; or
(H)any combination thereof.
(6)The term “cybersecurity purpose” means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability.
(7)The term “cybersecurity risk”—
(A)means threats to and vulnerabilities of information or information systems and any related consequences caused by or resulting from unauthorized access, use, disclosure, degradation, disruption, modification, or destruction of such information or information systems, including such related consequences caused by an act of terrorism; and
(B)does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement.
(8)(A)Except as provided in subparagraph (B), the term “cybersecurity threat” means an action, not protected by the First Amendment to the Constitution of the United States, on or through an information system that may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system.
(B)The term “cybersecurity threat” does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement.
(9)(A)Except as provided in subparagraph (B), the term “defensive measure” means an action, device, procedure, signature, technique, or other measure applied to an information system or information that is stored on, processed by, or transiting an information system that detects, prevents, or mitigates a known or suspected cybersecurity threat or security vulnerability.
(B)The term “defensive measure” does not include a measure that destroys, renders unusable, provides unauthorized access to, or substantially harms an information system or information stored on, processed by, or transiting such information system not owned by—
(i)the private entity, as defined in section 1501 of this title, operating the measure; or
(ii)another entity or Federal entity that is authorized to provide consent and has provided consent to that private entity for operation of such measure.
(10)The term “Director” means the Director of the Cybersecurity and Infrastructure Security Agency.
(11)The term “Homeland Security Enterprise” means relevant governmental and nongovernmental entities involved in homeland security, including Federal, State, local, and Tribal government officials, private sector representatives, academics, and other policy experts.
(12)The term “incident” means an occurrence that actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information on an information system, or actually or imminently jeopardizes, without lawful authority, an information system.
(13)The term “Information Sharing and Analysis Organization” means any formal or informal entity or collaboration created or employed by public or private sector organizations, for purposes of—
(A)gathering and analyzing critical infrastructure information, including information related to cybersecurity risks and incidents, in order to better understand security problems and interdependencies related to critical infrastructure, including cybersecurity risks and incidents, and protected systems, so as to ensure the availability, integrity, and reliability thereof;
(B)communicating or disclosing critical infrastructure information, including cybersecurity risks and incidents, to help prevent, detect, mitigate, or recover from the effects of an interference, a compromise, or an incapacitation problem related to critical infrastructure, including cybersecurity risks and incidents, or protected systems; and
(C)voluntarily disseminating critical infrastructure information, including cybersecurity risks and incidents, to its members, State, local, and Federal Governments, or any other entities that may be of assistance in carrying out the purposes specified in subparagraphs (A) and (B).
(14)The term “information system”—
(A)has the meaning given the term in section 3502 of title 44; and
(B)includes industrial control systems, such as supervisory control and data acquisition systems, distributed control systems, and programmable logic controllers.
(15)The term “intelligence community” has the meaning given the term in section 3003(4) of title 50.
(16)The term “malicious cyber command and control” means a method for unauthorized remote identification of, access to, or use of, an information system or information that is stored on, processed by, or transiting an information system.
(17)The term “malicious reconnaissance” 11 So in original. Probably should be followed by “means”. a method for actively probing or passively monitoring an information system for the purpose of discerning security vulnerabilities of the information system, if such method is associated with a known or suspected cybersecurity threat.
(18)The term “managed service provider” means an entity that delivers services, such as network, application, infrastructure, or security services, via ongoing and regular support and active administration on the premises of a customer, in the data center of the entity (such as hosting), or in a third party data center.
(19)The term “monitor” means to acquire, identify, or scan, or to possess, information that is stored on, processed by, or transiting an information system.
(20)The term “national cybersecurity asset response activities” means—
(A)furnishing cybersecurity technical assistance to entities affected by cybersecurity risks to protect assets, mitigate vulnerabilities, and reduce impacts of cyber incidents;
(B)identifying other entities that may be at risk of an incident and assessing risk to the same or similar vulnerabilities;
(C)assessing potential cybersecurity risks to a sector or region, including potential cascading effects, and developing courses of action to mitigate such risks;
(D)facilitating information sharing and operational coordination with threat response; and
(E)providing guidance on how best to utilize Federal resources and capabilities in a timely, effective manner to speed recovery from cybersecurity risks.
(21)The term “national security system” has the meaning given the term in section 11103 of title 40.
(22)The term “ransomware attack”—
(A)means an incident that includes the use or threat of use of unauthorized or malicious code on an information system, or the use or threat of use of another digital mechanism such as a denial of service attack, to interrupt or disrupt the operations of an information system or compromise the confidentiality, availability, or integrity of electronic data stored on, processed by, or transiting an information system to extort a demand for a ransom payment; and
(B)does not include any such event in which the demand for payment is—
(i)not genuine; or
(ii)made in good faith by an entity in response to a specific request by the owner or operator of the information system.
(23)The term “Sector Risk Management Agency” means a Federal department or agency, designated by law or Presidential directive, with responsibility for providing institutional knowledge and specialized expertise of a sector, as well as leading, facilitating, or supporting programs and associated activities of its designated critical infrastructure sector in the all hazards environment in coordination with the Department.
(24)The term “security control” means the management, operational, and technical controls used to protect against an unauthorized effort to adversely affect the confidentiality, integrity, and availability of an information system or its information.
(25)The term “security vulnerability” means any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control.
(26)The term “sharing” (including all conjugations thereof) means providing, receiving, and disseminating (including all conjugations of each such terms).
(27)The term “SLTT entity” means a domestic government entity that is a State government, local government, Tribal government, territorial government, or any subdivision thereof.
(28)The term “supply chain compromise” means an incident within the supply chain of an information system that an adversary can leverage, or does leverage, to jeopardize the confidentiality, integrity, or availability of the information system or the information the system processes, stores, or transmits, and can occur at any point during the life cycle.

Legislative History

Notes & Related Subsidiaries

Statutory Notes and Related Subsidiaries

Rule of

Construction

Pub. L. 117–263, div. G, title LXXI, § 7143(f), Dec. 23, 2022, 136 Stat. 3664, provided that: “(1) Interpretation of technical corrections.—Nothing in the

Amendments

made by subsections (a) through (d) [enacting this section and amending section 195f, 321l, 464, 571, 624, 651 to 652a, 655, 656, 659 to 663, 665, 665b, 665d, 665g, 665i, 671, 681, 1501, 1521, and 1524 of this title, section 278g–3a and 648 of Title 15, Commerce and Trade, section 824s–1 of Title 16, Conservation, section 300hh–10 and 18723 of Title 42, The Public Health and Welfare, section 70101 of Title 46, Shipping, and section 3049a and 3371a of Title 50, War and National Defense] shall be construed to alter the authorities, responsibilities, functions, or activities of any agency (as such term is defined in section 3502 of title 44, United States Code) or officer or employee of the United States on or before the date of enactment of this Act [Dec. 23, 2022]. “(2) Interpretation of references to definitions.—Any reference to a term defined in the Homeland Security Act of 2002 (6 U.S.C. 101 et seq.) on the day before the date of enactment of this Act that is defined in section 2200 of that Act [6 U.S.C. 650] pursuant to the

Amendments

made under this Act [Pub. L. 117–263, see Tables for classification] shall be deemed to be a reference to that term as defined in section 2200 of the Homeland Security Act of 2002, as added by this Act.”

Reference

Citations & Metadata

Citation

6 U.S.C. § 650

Title 6Domestic Security

Last Updated

Apr 3, 2026

Release point: 119-73not60